Post Job Free
Sign in

Security Sql Server

Location:
Stroudsburg, PA, 18360
Posted:
October 26, 2017

Contact this candidate

Resume:

Charles V. Frank, Jr.

**** ****** **., **** ** **360

Cell: 570-***-****

Email: **************@*****.***

Objective

To apply advanced cyber security principles and techniques focused on working with application and development teams to institute standard security controls and industry best practices integrated into project life-cycles. Apply cutting edge techniques and systems to help protect the confidentiality, integrity, and availability of corporate systems and data.

Educational Experience

Dakota State University (DSU)

Doctor of Science in Cyber Security

Research Interests: IoT Botnets, Malware, Reverse Engineering

To Be Awarded in 2019

James Madison University (JMU)

Master of Science in computer Science with concentration in INFOSEC

Thesis: SID: SQL Injection Detection

Awarded: May, 2004

East Stroudsburg University (ESU)

Bachelor of Science in Computer Science

Awarded: May, 1991

Research paper to be presented at the CONISAR’ 17 Conference, Austin Texas

Candidate for JISAR (Journal Information Systems Applied Research)

Protecting IoT from Mirai botnets; IoT device hardening

Peer review of three papers for conference

http://www.iscap.info/conisar/

Certifications and Other Notable Items

Protecting IoT from Mirai botnets; IoT device hardening. Presented at INSuRE’17 at Purdue University.

Integrating MSFT SYSMON with SPLUNK to detect TESLA CRYPT RANSOM WARE. www.linkedin.com/in/charles-frank-3b9a9426

Rogue HFT. Paper submission at 12 International Conference for Cyber Warefare.

SID: SQL Injection Detection.

http://books.google.com/books/about/SID.html?id=JI1zNwAACAAJ

NSA Security Certified, Security+

Advanced Cyber Security Skills

IDA PRO Disassembler, Windbg, Malware Analysis, Software Vuln. Analysis, Python Scripting, Cloud Computing, IoT, SIEM

Work Experience

Jun 2017 – Present, InfoSec CISO Executive, EY, Secaucus, NJ.

Primary focus on the security controls and mitigating risk for the EY Mercury program. A POC document approval for CyberArk for password account vaulting and a detailed guideline for implementing logging within SAP for ONAPSIS Threat Detection and Response and SPLUNK SIEM.

CyberSecurity Advisor to Assistant Director

Consultant for POC approval for CyberArk password vaulting

Detailed guideline to implement SAP logging integrated with ONAPSIS Threat Detection and Response and SPLUNK SIEM. Consultant for POC.

WAF (Web Application Firewall) operations document

Approval of firewall requests thru WAF

Jan. 2017 – April 2017, Sr. Cloud Architect, HCL, Client: Ascensia, Parsippany, NJ

As the Sr. Cloud Architect, created Azure SQL (PaaS) with firewalling and logins. Migrated systems utilizing Azure SQL. Presented a new security architecture consisting of audit activity, diagnostic logging, and virtual network appliance for firewalling. For internet access to applications, WAG (Web Application Gateway) with WAF (Web Application Firewall) with OWASP 3.0 was presented for application layer security. Azure Application Security (CASB) was researched and presented to secure the cloud at the application layer as well as to detect threats.

Review current Azure Cloud Architecture to determine improvements in security

Proposed New Secure and Elastic design for Azure to upper management

Developed Sharepoint project plan for Application Migrations into Azure for PTO (Permit to Operate), PTT (Permit to Test), PTP (Permit to Production)

Azure Application Security (CASB) to monitor application usage within Azure

AZURE SQL (PaaS) with firewall to utilize PaaS

WAG (Web Application Gateway) to allow remote access thru the internet to the application

WAF (Web Application Firewall) to perform application layer security from Internet access

IIS configuration for allowing web access to application via HTTPS

Migration of applications into AZURE for split from Bayer to Ascensia

Feb. 2014– Sept. 2016, Lead Azure Security Architect, Becton Dickinson Franklin Lakes, NJ

Teamed up with Microsoft consulting services and Microsoft India DevOps, developed security services layer as well as network segmentation consisting of a Web layer, SAP applications layer and SQL Server (IaaS) layer. All traffic routed thru Barracuda Virtual Firewall appliance for IDS/IPS. Developed extensive automation for subnet cloning. Responsible for all aspects of the project.

Responsible for project plan and all operational tasks in AZURE

Lead Security/ Operational Engineer / Architect for AZURE Cloud

Expert knowledge of POWERSHELL, PYTHON, C/C++

Powershell runbooks to clone VM, clone disks, cloud automation

400+ VMs in Azure, 60+ Premium Storage VMs

Premium VM for SQL Server DB (IaaS)

Conversion of CLOUD SERVICES to the new RESOURCE GROUPS

Resource Groups allow for parallelization and faster cloning of VMs

Conversion of old storage to new PREVIEW STORAGE

VM, VNET, INTERFACE, SECURITY resources in RESOURCE GROUPS

Multiple Subscriptions, Multiple Subnets

All subnet traffic routed thru Barracuda Firewall for IDS and IPS

AUTOMATION via RUNBOOK and POWERSHELL

Use of TEMPLATES for automation

RUNBOOKS for cloning subnets, creating VMs, starting/stopping VMs

Custom RUNBOOK for backup/restore PREMIUM VMS

BACKUP VAULT for non-premium VMS

BACKUP VAULT for PREMIUM VMs

BACKUP VAULT for RESOURCE GROUPS

Administration of MICROSOFT SQL SERVER

Administration of Remote Applications in each subnet

Administration of Active Directory with ADUC

Patch Management for All Windows Servers

Administration of BARRACUDA Firewall within Azure

Role Based Access Control for PREVIEW PORTAL

Migration of TERRABYTES of SAP data into SQL SERVER

Problem resolution for SAP migration

Mentor for Cloud Azure Project and junior members

June 2012 – Feb. 2014, Lead Technical Basis Admin., Mercedes Benz Montvale, NJ

Responsible for the archiving mandate for all of Mercedes Benz, consisting of the largest migration project to-date for SAP. Developed archiving architecture with ILM (Identity Lifecycle Management). Developed sharepoint site for project deliverables and presented archiving project to upper-management.

Project coordination with MB-USA, MB-GERMANY, MB-INDIA

Administration of SAP on VMWARE

PoC for MB Archiving Mandate: SARA, PBS, SAP ILM

Upgrade to SOLMAN 7.1 with SWPM

Performance analysis of ECC 6.0 and PI on SOLARIS ZONES

Oracle 11G performance Tuning / SAP performance tuning

Supervision and performance analysis of Oracle 11G Compression

Technical Lead for Archiving Architecture Project

Performance Analysis of JAVA AS and JAVA Garbage Collection

Daily Basis Administration tasks

June 2011 – June 2012, LEAD SAP Migration Engineer, SAP Migration Factory, IBM Remote

Developed DOU (Documents of Understanding) and project plan for customers migrating on-premises SAP systems into IBM platform. Developed architecture for new platform as well as migration of the SAP system consisting of ORACLE RDBMS. Mentored junior members.

Interaction with resources from: USA, CANADA, India, China, Poland

Migration of SAP into IBM Virtualized Cloud

Performance Analysis of LPARS and VIO

Installation of ORACLE RAC into LPAR along with performance tuning

Lead Migration Engineer on GOM project

Migration from HPUX to LPARS and VIO

Provided technical guidance to SAP Migration Engineers

Developed Migration Documentation utilized by migration team

Oracle 11G installation / ORACEL 11G parameter settings / AIX Clustering

Oracle 11G Bundle Patch application with MOPATCH

Technical Advisor for MDM and PI migration for Miller Coors

SQL Server migration in windows cluster

Developed Project Plans for several clients for SAP/Oracle migrations

Developed DOUs (Document of Understanding) for several clients for SAP/Oracle migrations

March 2007 – Sept. 2011, Cloud Lead, US ARMY Dover, NJ

Team lead supervising 10+ administrators. Determined new cloud platform. Architected and engineered the cloud, including the security layer, web layer, application layer, and database layer. Developed the migration plan to the new cloud.

Interaction with SAP-Germany and SAP-Israel and Pentagon

Lead team of 100+ into a secure private SAP cloud

Configuration of LDAP in XENSERVER REDHAT LINUX

STIG REDHAT Linux VM for VM Template

System OS/DB migration from SOLARIS/ZONE/Oracle 10G into LINUX/XENSERVER/ORACLE 11G: ECC,PI,BI,SRM,GRC,EP,SOLMAN,CUA

System OS/DB migration of ECC 6.0 from Linux/XENSERVER/Oracle in Penn State ARL (Applied Research Lab) to Windows/VMWARE/Oracle

System OS/DB migration of PI 7.1 from Linux/XENSERVER/Oracle in Penn State ARL (Applied Research Lab) on Windows/VMWARE/Oracle

More than 100 VM migrations to different platforms (DEV,TST,QAS,STG,PRD)

OS/DB migrations of multiple ORACLE Terabyte Databases

All Oracle DBA functions

All SAP Basis functions

All Unix/Linux Admin functions

All XENSERVER virtualization functions

Expert SAN knowledge / coordination of SAN configuration

March 2006 – March 2007, Lead SAP Administrator, Wyeth Pharmaceuticals Malvern, PA

Developed Security Design for Wyeth Bio-tech

Utilized SAP GRC for all security/role development

RBAC with transaction pfcg

Resolved SOX and Part 11 compliance issues

Developed security from EP

July 2005 – March 2006, SAP Basis Administrator, ESSROC Nazareth, PA

All Basis functions

All Security functions

Windows Administration

SAP supported on AS400 with DB2

June 2003 – July 2005, Lead SAP Administrator, Purdue Pharma West Patterson, NJ

All Basis functions

All Security functions

HP-UX administration

Oracle Administration

May 2002 – June 2003, SAP Administrator, Becton Dickinson Franklin Lakes, NJ

All SAP Security functions

Developed roles with pfcg

Developed Perl IDS (Intrusion Detetction System) which runs on all SPARC/Solaris servers

June 1998 – Aug. 1999, SAP Basis Team Lead, RCM Technologies Westfield, NJ

All SAP Basis functions

ALL SAP security functions

SAP supported on Windows OS

MS SQL server administration

May 1995 – July 1997, Client/Server Specialist, American Standard Inc. Piscataway, NJ

All SAP Basis functions

ALL SAP security functions

Unix Admin.

Windows Admin.

Oracle Admin.

MS SQL Server Admin

.

Jan. 1992 – May 1995, Information Management, AT&T Parsippany, NJ

C programming

Unix Administration

Technical Skills

In-depth Programming knowledge in many languages

Excellent understanding of SDLC (Software Development Lifecycle)

Very strong in securing public clouds, especially Microsoft Azure (IaaS, PaaS, SaaS)

Very strong in algorithmic design and performance analysis

Knowledge of reverse engineering with IDA Pro and reversing RANSOMEWARE

Knowledge of EDR (Endpoint Detection Response)

Knowledge in Application Layer attacks

Experience with Vulnerability scanners such as Retina, Nessus, and NMAP

Strong Cyber Security Background

Expert knowledge in IoT Mirai botnet

Expert knowledge of SAP ERP and databases



Contact this candidate